Date: Wednesday, June 24th, 2020 at 1pm – 3pm EDT
For many infosec analysts, sandboxes play a crucial role in their ability to collect Indicators of Compromise (IOCs) and identify malware.
What happens when the sandbox fails?
In this webinar, Binary Defense security analysts James Quinn and Brandon George will demonstrate ways that you can react when a sandbox fails to extract IOCs, using a guided analysis of Emotet’s WiFi spreader. Also:
Tips to speed up static analysis
Steps to take when debugger doesn’t debug
This will be an informative, technical webinar for experienced and new security analysts and malware researchers / reverse engineers. The webinar will be live screens of a test environment, so attendees can follow along.
Register Today
About the Presenters
Brandon George is a Senior SOC Analyst for Binary Defense. In his free time, he is often with friends and family, running, or working on research projects. Probably never at the same time though.
James Quinn is a Threat Researcher and Malware Analyst for Binary Defense. When he is not working at Binary Defense, he works as a freelance malware analyst and participates in security intelligence sharing groups. James is a major contributor to research of the Emotet botnet with the Cryptolaemus security researcher group.